The Cyber Defense eMagazine August Edition for 2023
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
It doesn’t have to be.<br />
First, we need to think more proactively – reacting to incident alerts and then scrambling to identify the<br />
best response leaves adversaries with an advantage. But proactive security certainly has its challenges;<br />
trying to spot looming threats has been dismissed as too difficult and expensive.<br />
Frankly, wading through millions of data points is not a human-scale problem. Without tools to effectively<br />
process, analyze, and prioritize data, these internal clues often remain undetected, or are discovered<br />
<strong>for</strong>ensically, long after attacks have occurred.<br />
Today’s security challenges are less about detection than they are about connecting the dots. With the<br />
growing number of tools, there is lots of overlap, and adding new tools has diminishing returns. Ultimately,<br />
we need better ways to integrate, connect, and orchestrate action across the security tools we already<br />
have.<br />
St. Margaret’s serves as a stark reminder of the worst-case scenario <strong>for</strong> a small healthcare organization.<br />
Without enough resources to invest in robust security, updated systems, and without having a clear<br />
recovery plan, these important local providers can be put out of business, leaving their communities with<br />
limited – if any – healthcare services.<br />
This is an industry-wide problem, yet we expect our under-resourced teams to defend themselves against<br />
perpetual threats. Visibility is critical to detection. Automation is critical to scale. Intelligence and alerting<br />
are critical in order to take action. But we can’t rely solely on independent tools. We must invest in<br />
pragmatic systems that can integrate, share, and contextualize quickly, reliably, and with confidence, and<br />
make these capabilities available as managed services <strong>for</strong> smaller organizations.<br />
About the Author<br />
Emily L. Phelps has written about and worked in the cybersecurity space <strong>for</strong> nearly<br />
a decade. Throughout her career, she has helped translate complex technical<br />
material into digestible insights <strong>for</strong> business leaders, and she has supported<br />
cybersecurity initiatives and solutions in order to assist practitioners in their day-today<br />
work. Emily is a fierce advocate <strong>for</strong> pragmatic cybersecurity programs that<br />
enable organizations to operate, uninterrupted, by cyber threats.<br />
Emily can be reached on Twitter at @CywareCo and at the Cyware website:<br />
https://cyware.com/<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 57<br />
Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.